1. 2 Mike Giovinazzo Director, ESD Government On-Line: The view from Ground Zero ECC Symposium 2001

Preview:

Citation preview

1

2

Mike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESDMike Giovinazzo Director, ESD

Government On-Line: Government On-Line: The view from Ground ZeroThe view from Ground Zero

ECC Symposium 2001ECC Symposium 2001

3

Government FocusGovernment Focus

“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”

“By 2004…to be known around the world as the government most connected to its citizens, with Canadians able to access all government information and services on-line at the time and place of their choosing.”

Government On-line Initiative Government On-line Initiative Government On-line Initiative Government On-line Initiative

4

Government On-line: ObjectivesGovernment On-line: Objectives

Improve services to Canadians

Increased Efficiency and cost reduction

Create a government for 21st Century

Serve as catalyst for EC

Improve services to Canadians

Increased Efficiency and cost reduction

Create a government for 21st Century

Serve as catalyst for EC

5

World Wide OpportunityWorld Wide Opportunity

While The US grows at compound rates the rest of the

world will grow even faster. This

spells great opportunity for Canadian firms.

While The US grows at compound rates the rest of the

world will grow even faster. This

spells great opportunity for Canadian firms.

6

Adoption Hype CycleAdoption Hype Cycle

7

Observations & ChallengesObservations & ChallengesObservations & ChallengesObservations & Challenges

Early adopters / Pathfinders Early adopters / Pathfinders

8

Major ThemesMajor Themes

Security Privacy Common Look & Feel Anticipating Complexity Legacy Integration Challenges Managing Expectations Business Reengineering & Policy Funding/Scheduling Limitations

Security Privacy Common Look & Feel Anticipating Complexity Legacy Integration Challenges Managing Expectations Business Reengineering & Policy Funding/Scheduling Limitations

9

SecuritySecurity

TRUST - The cornerstone of security TRUST - The cornerstone of security TRUST - The cornerstone of security TRUST - The cornerstone of security

10

SecuritySecurity

Many assume PKI is the answer, but ... Many assume PKI is the answer, but ...

11

SecuritySecurity

PKI is mostly policy not technology

Select your goal(s): Encryption(Confidentiality), Data Integrity, Authentication, Non-repudiation

PKI is mostly policy not technology

Select your goal(s): Encryption(Confidentiality), Data Integrity, Authentication, Non-repudiation

12

What Level of Security ?What Level of Security ?

13

Mutli-channel considerationsMutli-channel considerations

Different access

channels have different authentication requirements

14

Personalization Vs PrivacyPersonalization Vs Privacy

15

Coping with Privacy Coping with Privacy

Horizontal Integration Is privacy in conflict with validation

e.g. “confirm sin ### ### ### = NAME” For a student loan ...

how to confirm you are a single parent

Vertical Integration Data exchange with provinces or

private enterprise

Horizontal Integration Is privacy in conflict with validation

e.g. “confirm sin ### ### ### = NAME” For a student loan ...

how to confirm you are a single parent

Vertical Integration Data exchange with provinces or

private enterprise

16

“common look and feel”“common look and feel”

Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users

sacrifices too much screen real-estate(copyright, federal identity, …)

strict standards (search engine, resolution, frames, accessibility ...)

“Application” focused standards under development

Created to ensure homogeneous sites Designed with “publishing” orientation Inappropriate for internal users

sacrifices too much screen real-estate(copyright, federal identity, …)

strict standards (search engine, resolution, frames, accessibility ...)

“Application” focused standards under development

17

“common look and feel”“common look and feel”

"Too often in the past, government services were "Too often in the past, government services were designed from the "inside out"; they reflected the designed from the "inside out"; they reflected the

structures of government organizations more structures of government organizations more than the needs and priorities of citizens. …than the needs and priorities of citizens. …

We cannot stop until We cannot stop until allall Canadians can have Canadians can have seamless access to seamless access to allall government services government services

quickly, simply and with a minimum of fuss".quickly, simply and with a minimum of fuss".

Privy Council Seventh Annual Report to The P.M.

18

4.

Supply Line Integration

3.Legacy

Integration

Evolution of Web Presence Evolution of Web Presence

2.

Limited Web Transactions Complexity

Val

ue

1. Web Site

19

Managing ComplexityManaging Complexity

Browser

Servlet Container

EJB Container

Application Servers

Relational Database

O/R Mapping

Graphic Artist

Server-Side Developer

Client-Side Developer

20

Managing ComplexityManaging Complexity

Application Services

JTA

Data Access Engine (DAE)

Database Drivers

Transaction Manager Encina

Event Log

Email Support

Synchronizer

State/Session

Conn. Pooling

Streaming

Result Cache

Security (ACL)

Directory Service (LDAP)

Web Connectors NSAPI, ISAPI, CGI

Encryption Plug In Load Balancer Plug In

Application LogicProcessing

HTML, JSP, Servlets

Presentation Layer

EJB JDBC, JTA

Data Access

C/C++

Business Layer

Request Manager Queue Manager

Tread Manager RequestSecurity Manager

Request ManagementSystem

Load Monitor Load BalancerLoad Balancing System

Protocol ManagerHTTP

CGI NSAPI ISAPI NASProtocol

IIOPOCLService A

dministrative S

ervices & S

NM

P Integration

21

Simplified FrameworkSimplified Framework

Internet Access

Back-end Systems

Interface Services

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Planetworks Interspace

Visual Age for Smalltalk, Coldfusion, Metro, Edify, Silverstream and MS Transaction Server

Borderware Firewall and Checkpoint Firewall

Netscape Server, Microsoft IIS, Oracle Webserver, Visual Age for Smalltalk, Coldfusion, Metro, Edify & Silverstream and Apache Web Server

Entrust Suite, Secure ID and Gradient NetCrusader

Netscape Browser, MS Internet Explorer and all access methods

CICS, DB2, Oracle

22

Internet Access

Application Services

Presentation Services

Internet Access

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Internet Access

Back-end Systems

Interface Services

Application Services

Infrastructure SecurityServices

Presentation Services

Client Security

Levels of Complexity Levels of Complexity

23

Managing Expectations Managing Expectations

Internally Secure channel’s role/capability We expect everyone to access our site

ExternallyPublic wants 7/24new medium means new service levelschoice of channel

“digital divide” means more $ not less

“single window”

Internally Secure channel’s role/capability We expect everyone to access our site

ExternallyPublic wants 7/24new medium means new service levelschoice of channel

“digital divide” means more $ not less

“single window”

24

Business Re-engineering & PolicyBusiness Re-engineering & Policy

In self service applications Who takes responsibility for data

accuracy ? What is the impact of system

unavailability ?

Policy vs Organisational Efficiency

In self service applications Who takes responsibility for data

accuracy ? What is the impact of system

unavailability ?

Policy vs Organisational Efficiency

25

TrainingTraining

Object-Oriented techniques

Component based architectures

Stateless processing

GUI design

Object-Oriented techniques

Component based architectures

Stateless processing

GUI design

Formal SDLC / methodologies

Configuration Management

Batch processing Legacy Integration

Formal SDLC / methodologies

Configuration Management

Batch processing Legacy Integration

26

Funding / Scheduling LimitationsFunding / Scheduling Limitations

Cost of PKI and CA Recently funded centrally

153 submissions for funding (July 31, 2000)

Total request funds $235 Million

27 pathfinders funded (approx. $60 Million)

Timelines are set but infrastructure like Secure Channel is not ready

Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004

Cost of PKI and CA Recently funded centrally

153 submissions for funding (July 31, 2000)

Total request funds $235 Million

27 pathfinders funded (approx. $60 Million)

Timelines are set but infrastructure like Secure Channel is not ready

Tier 1 was easy; more ambitious is Tier 2 & 3 by 2004

27

Any Questions ?Any Questions ?Thank YouThank You

28

Recommended